Cryptanalysis of MD2
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 503258 (Why is no real title available?)
- scientific article; zbMATH DE number 503327 (Why is no real title available?)
- A (Second) Preimage Attack on the GOST Hash Function
- Advances in Cryptology – CRYPTO 2004
- An improved Monte Carlo factorization algorithm
- Cryptanalysis of the GOST Hash Function
- Cycle detection using a stack
- Fast Software Encryption
- MD2 is not secure without the checksum byte
- Nondeterministic Algorithms
- One Way Hash Functions and DES
- Parallel collision search with cryptanalytic applications
- The MD2 Hash Function Is Not One-Way
- Weaknesses in the HAS-V Compression Function
Cited in
(9)- Cryptanalysis of Vortex
- Cryptanalysis of a Hash Function Based on Norm Form Equations
- Cryptanalysis of CTC2
- Cryptanalysis of MDC-2
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- Fast Software Encryption
- The MD2 Hash Function Is Not One-Way
- MD2 is not secure without the checksum byte
- Cryptanalysis of hash functions on the MD4-family.
This page was built for publication: Cryptanalysis of MD2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2267363)